cBrain

F2 Climate Cloud

F2 Climate Cloud aims to reduce the time gap from political decision to execution for initiatives to support environmental objectives such as CO2 reduction, biodiversity, or mitigation of effects of climate change. It offers configurable case management templates that allows governments to rapidly implement climate initiatives.

Features

  • Environmental Impact Assessments
  • Integration with GIS tools for land mapping
  • Templates for grant management for climate initiatives
  • Configurable workflows for audit and field inspections
  • Configurable workflow for licensing
  • Dashboards supporting multi-agency working
  • Extended Producer Reponsibility Licensing and Registration
  • Full set of open (RESTful) APIs
  • Self-service forms for citizens and businesses
  • My cases features for managing caseload

Benefits

  • Create end to end workflow for climate initiatives
  • Climate action reporting platform
  • Automated case handling and records management
  • Approvals and workflow to improve productivity and quality
  • Easily deploy new grant programmes
  • Easily find documents and information on case status
  • Version control and full audit trail for transparency reporting
  • Security groups for granular access control over information access
  • Archiving and data export for detailed analytics

Pricing

£9 to £47 a person a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at dgc@cbrain.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

9 9 8 8 7 0 6 5 7 6 7 6 1 3 6

Contact

cBrain David Cotterill
Telephone: 0045 71741380
Email: dgc@cbrain.com

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
N/a
System requirements
  • Modern browser capable of rendering html5
  • For windows users .net 4.6 or later
  • For windows users requires windows 7 or later

User support

Email or online ticketing support
Email or online ticketing
Support response times
Depends on the SLA purchased. All urgent (severity 1) issues are responded to as soon as they are received. Otherwise within 4 hours.

On weekends, only urgent issues will be responded to as a matter of course.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
We supply a single support level as default:
For sev 1 and sev 2 problems the support desk will respond as soon as possible on receipt of the problem report. Work will continue within normal working hours until the problem has been satisfactorily resolved.
A 24/7 phone service is available for out-of-hours urgent problems.

For severity 3 and 4 problems the support desk will respond within 4 hours within normal working hours. Configuration changes will be scheduled, and any code changes to be deployed would happen in a scheduled release.

For severity 5 problems will be addressed by the supplier as part of regular maintenance and the customer informed when action is taken.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Onsite training, user documentation.
Online training available at extra cost.
Service documentation
Yes
Documentation formats
  • ODF
  • PDF
  • Other
Other documentation formats
OOXML
End-of-contract data extraction
Users can extract data in pdf format using established reporting function; in csv using reporting function; using a REST API; or using our extract programme which will typically create either csv or xml files.
End-of-contract process
Included in price is decommissioning of server and destruction of back-ups, along with self-service extraction of data.
Additional costs are involved if customer wants to destroy disks themselves, or if specific data extracts are required.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The desktop service has additional features available, including FOI processing, advanced case management, and administrator functions
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
There is a windows user interface and also an html5 interface
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Tested with users of assistive technology in several countries.
API
Yes
What users can and can't do using the API
User can create, read, and update content in the platform - for cases, records, documents, people.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
Each authority is assigned a separate logical database and application url which means there is no contention on the urls, or on the database.
Multiple authorities may reside on the same servers.

Analytics

Service usage metrics
Yes
Metrics types
Number of users, user activity, - other metrics available through reporting function and can be configured by customer.
Dashboard function can be configured for case management workflows to give real-time view.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Users can write reports and export directly to csv, html, or spreadsheet package.
All documents and metadata can be downloaded as pdf.
Users can use REST APIs to extract data.
Specific exports can be created at additional cost.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • Documents can be exported in original format
  • Pdf
  • All data can be exports directly into SQL tables
  • Tiff for long term archiving
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Original format for documents
  • Xml

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Availability is targeted at 99.5%
Approach to resilience
Available on request
Outage reporting
E-mail alerts

Identity and authentication

User authentication needed
Yes
User authentication
Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels
Management interfaces are based on assigning specific roles and privileges to users; authentication is managed via Active Directory. So user needs to be a valid user with appropriate role and associated privileges in order to access the management interface.
For certain accesses a separate administrator role is created and user granted temporary access to.
Access restriction testing frequency
At least once a year
Management access authentication
Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI Group
ISO/IEC 27001 accreditation date
06/12/2018
What the ISO/IEC 27001 doesn’t cover
Everything in the F2 service description is covered by the certification
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISAE 3000
  • ISAE 3402

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials
Information security policies and processes
Security policies and risks are created at operational level and signed off by board member.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We follow standard ITIL processes for configuration and change management with control board oversight for any changes to production systems (which must be signed off in advance)
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threats identified by software providers are patched as soon as practical depending on the criticality of the vulnerability
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
At data centre level there are protective monitoring processes that conform to ISAE 3402
Incident management type
Supplier-defined controls
Incident management approach
Pre-defined procedures exist for all kinds of incidents, and we have an operational cockpit to alert us to incidents.
Users can report incidents through our service desk, the incident will be investigated and full report provided back to the customer upon completion.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

When choosing suppliers considerations to environmental factors must be taken into account. Suppliers and
products with environmental friendly profiles should be favoured.
As an international company, it is necessary for us to make flight transfers. However, these must be limited to the
absolute necessary due to both economic and environmental considerations.
Transportation around the Copenhagen area should, when possible, be taken by bicycle. Bicycles are available for
employees who do not cycle to work.
When transportation is not available by bicycle, public transportation must be used where possible.
Garbage with a significant negative environmental effect (as batteries, IT equipment, etc.) should be reused when
possible or disposed according to governmental recommendations.
Food waste should be kept at a minimum. We do so by regulating our consumptions on a daily basis and by giving
all employees the opportunity to take home left over food.
The management team is obligated to communicate our environmental policy to all employees twice a year.
Covid-19 recovery

Covid-19 recovery

We monitor sick leave and other indicators of employees’ wellbeing in the workplace on a monthly
basis. When irregularities in an employee’s behaviour is detected, we encourage the employee to let us
know which problems she or he is dealing with so that we can take preventive actions to help. By doing
so, we can balance expectations and downsize the employee’s workload if needed.
Smoking is only allowed in a limited outside area, and we offer all employees the opportunity to receive
financial support towards attending smoking cessation courses. When hiring new employees nonsmokers are preferable.
We are actively helping employees, who suffer from obesity, to engage in weight loss programmes as
workout programmes, fitness, dietary advice, e.g.
We provide all employees with the opportunity to enjoy a healthy lunch at work. Employees with
allergies or specific dietarian needs are cared for, so they also have the opportunity to receive a healthy
diet.
We provide employees with the opportunity to conduct workouts during their working hours. This offer
is, in particular, to help employees with sedentary work get exercise.
We offer all employees the opportunity to receive a massage sessions at work.
Once a year an occupational therapist show our employees how to work in the right position so that
work injuries can be avoided.
We offer all employees the opportunity to receive influenza vaccinations to prevent unnecessary
sickness.
Tackling economic inequality

Tackling economic inequality

We respect and recognise all employees’ rights to freedom of association and collective bargaining.
We will neither directly nor indirectly be complicit in child or forced labour.
We will not discriminate in respect of employment or occupation.
We are committed to give our employees the best possible working conditions by continuously evaluating
work processes and following industry trends for employee benefits.
We are actively working towards promoting a working culture that embraces a healthy balance between
work and private life. We believe that we are only able to develop and deliver innovative products of high
quality if all of our employees are motivated.
We are committed to continuously adopting a flat organisational structure where it is the quality of the
argument rather than the title of the position that counts. This is to promote a culture of creativity and
innovation, where all employees feel confident in raising their ideas and concerns.
Equal opportunity

Equal opportunity

We aim to have the highest possible degree of diversity in our organisation, as we believe the
complementary competence that comes from this diversity will foster innovation and create better
circumstances for sustainable decisions and solutions to be made.
For cBrain diversity means differences in gender, age, education, international experience, language, etc.
The IT industry is generally characterised by employing significantly fewer women than men. Over the past
several years, we have in cBrain worked to create a more balanced distribution by always choosing the
female candidate in situations where a man and a woman, with equal qualifications, has applied and
qualified for the same position. This strategy has led us to a position where over a third of our workforce is
women.
Our goal is that a third of our management team consists of women. However, we consider continuity
within our management team as important and we, therefore, do not wish to replace any parts of our
management team before it becomes relevant due to natural causes. When hiring personnel for
management positions the same policy as for all other positions will be guiding the process. As described
above this means that a woman will be favourited in situations where a man and a woman, with the same
qualifications, are competing for the same position.
cBrain’s management team will continuously evaluate which appropriate actions that can be taken to help
promote a more equally distributed proportion of men and women in our management team.
Wellbeing

Wellbeing

We monitor sick leave and other indicators of employees’ wellbeing in the workplace on a monthly
basis. When irregularities in an employee’s behaviour is detected, we encourage the employee to let us
know which problems she or he is dealing with so that we can take preventive actions to help. By doing
so, we can balance expectations and downsize the employee’s workload if needed.
Smoking is only allowed in a limited outside area, and we offer all employees the opportunity to receive
financial support towards attending smoking cessation courses. When hiring new employees nonsmokers are preferable.
We are actively helping employees, who suffer from obesity, to engage in weight loss programmes as
workout programmes, fitness, dietary advice, e.g.
We provide all employees with the opportunity to enjoy a healthy lunch at work. Employees with
allergies or specific dietarian needs are cared for, so they also have the opportunity to receive a healthy
diet.
We provide employees with the opportunity to conduct workouts during their working hours. This offer
is, in particular, to help employees with sedentary work get exercise.
We offer all employees the opportunity to receive a massage sessions at work.
Once a year an occupational therapist show our employees how to work in the right position so that
work injuries can be avoided.
We offer all employees the opportunity to receive influenza vaccinations to prevent unnecessary
sickness.

Pricing

Price
£9 to £47 a person a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at dgc@cbrain.com. Tell them what format you need. It will help if you say what assistive technology you use.